Pub Date : 2023-05-17DOI: 10.1007/s00200-023-00609-3
Boran Kim
{"title":"Correction: Determination for minimum symbol-pair and RT weights via torsional degrees of repeated-root cyclic codes","authors":"Boran Kim","doi":"10.1007/s00200-023-00609-3","DOIUrl":"10.1007/s00200-023-00609-3","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 4","pages":"589 - 589"},"PeriodicalIF":0.6,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135861225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-13DOI: 10.1007/s00200-023-00606-6
Hans Zantema, Vincent van Oostrom
Illustrated by a problem on paint pots that is easy to understand but hard to solve, we investigate whether particular monoids have the property of common right multiples. As one result we characterize generalized braid monoids represented by undirected graphs, being a subclass of Artin–Tits monoids. Stated in other words, we investigate to which graphs the old Garside result stating that braid monoids have the property of common right multiples, generalizes. This characterization also follows from old results on Coxeter groups and the connection between finiteness of Coxeter groups and common right multiples in Artin–Tits monoids. However, our independent presentation is self-contained up to some basic knowledge of rewriting, and also applies to monoids beyond the Artin–Tits format. The main new contribution is a technique to prove that the property of common right multiples does not hold, by finding a particular model, in our examples all being finite.
{"title":"The paint pot problem and common multiples in monoids","authors":"Hans Zantema, Vincent van Oostrom","doi":"10.1007/s00200-023-00606-6","DOIUrl":"10.1007/s00200-023-00606-6","url":null,"abstract":"<div><p>Illustrated by a problem on paint pots that is easy to understand but hard to solve, we investigate whether particular monoids have the property of common right multiples. As one result we characterize generalized braid monoids represented by undirected graphs, being a subclass of Artin–Tits monoids. Stated in other words, we investigate to which graphs the old Garside result stating that braid monoids have the property of common right multiples, generalizes. This characterization also follows from old results on Coxeter groups and the connection between finiteness of Coxeter groups and common right multiples in Artin–Tits monoids. However, our independent presentation is self-contained up to some basic knowledge of rewriting, and also applies to monoids beyond the Artin–Tits format. The main new contribution is a technique to prove that the property of common right multiples does not hold, by finding a particular model, in our examples all being finite.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"341 - 363"},"PeriodicalIF":0.6,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00606-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48208169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-13DOI: 10.1007/s00200-023-00604-8
Yan Liu, Xiwang Cao, Zhengbang Zha
Cyclic codes are an important subclass of linear codes. In this paper, we investigate the construction of quinary cyclic codes with parameters ([5^{m}-1, 5^{m}-2m-2, 4]) and eight new classes optimal quinary cyclic codes of form ({mathcal {C}}_{(1,e,s)}) are presented by discussing the solutions of certain equations over ({mathbb {F}}_{5^{m}}).
{"title":"More classes of optimal quinary cyclic codes of form ({mathcal {C}}_{(1,e,s)})","authors":"Yan Liu, Xiwang Cao, Zhengbang Zha","doi":"10.1007/s00200-023-00604-8","DOIUrl":"10.1007/s00200-023-00604-8","url":null,"abstract":"<div><p>Cyclic codes are an important subclass of linear codes. In this paper, we investigate the construction of quinary cyclic codes with parameters <span>([5^{m}-1, 5^{m}-2m-2, 4])</span> and eight new classes optimal quinary cyclic codes of form <span>({mathcal {C}}_{(1,e,s)})</span> are presented by discussing the solutions of certain equations over <span>({mathbb {F}}_{5^{m}})</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"327 - 339"},"PeriodicalIF":0.6,"publicationDate":"2023-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45582324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-09DOI: 10.1007/s00200-023-00607-5
Marcin Choiński
In this paper we introduce and analyze a discrete SIS epidemic model for a homogeneous population. As a discretization method the strictly positive scheme was chosen. The presented model is built from its continuous counterpart known from literature. We firstly present basic properties of the system. Later we discuss local stability of stationary states and global stability for the disease-free stationary state. The results for this state are expressed with the use of the basic reproduction number. The main conclusion from our work is that conditions for stability of the stationary states do not depend on the step size of the discretization method. This fact stays in contrary to other discrete models analyzed in our previous papers. Theoretical results are accomplished with numerical simulations.
{"title":"A discrete SIS-model built on the strictly positive scheme","authors":"Marcin Choiński","doi":"10.1007/s00200-023-00607-5","DOIUrl":"10.1007/s00200-023-00607-5","url":null,"abstract":"<div><p>In this paper we introduce and analyze a discrete <i>SIS</i> epidemic model for a homogeneous population. As a discretization method the strictly positive scheme was chosen. The presented model is built from its continuous counterpart known from literature. We firstly present basic properties of the system. Later we discuss local stability of stationary states and global stability for the disease-free stationary state. The results for this state are expressed with the use of the basic reproduction number. The main conclusion from our work is that conditions for stability of the stationary states do not depend on the step size of the discretization method. This fact stays in contrary to other discrete models analyzed in our previous papers. Theoretical results are accomplished with numerical simulations.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 2022","pages":"17 - 30"},"PeriodicalIF":0.6,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00607-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45166937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-04DOI: 10.1007/s00200-023-00602-w
Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini
Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial system. Each output bit/word can be expressed as a polynomial equation in the cipher’s inputs—namely the key and the plaintext or the initialisation vector bits/words. A part of research in this area consists in finding suitable algebraic structures where polynomial systems can be effectively solved, e.g., by computing Gröbner bases. In 2009, Dinur and Shamir proposed the cube attack, a chosen plaintext algebraic cryptanalysis technique for the offline acquisition of an equivalent system by means of monomial reduction; interpolation on cubes in the space of variables enables retrieving a linear polynomial system, hence making it exploitable in the online phase to recover the secret key. Since its introduction, this attack has received both many criticisms and endorsements from the crypto community; this work aims at providing, under a unified notation, a complete state-of-the-art review of recent developments by categorising contributions in five classes. We conclude the work with an in-depth description of the kite attack framework, a cipher-independent tool that implements cube attacks on GPUs. Mickey2.0 is adopted as a showcase.
{"title":"Fourteen years of cube attacks","authors":"Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini","doi":"10.1007/s00200-023-00602-w","DOIUrl":"10.1007/s00200-023-00602-w","url":null,"abstract":"<div><p>Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial system. Each output bit/word can be expressed as a polynomial equation in the cipher’s inputs—namely the key and the plaintext or the initialisation vector bits/words. A part of research in this area consists in finding suitable algebraic structures where polynomial systems can be effectively solved, e.g., by computing Gröbner bases. In 2009, Dinur and Shamir proposed the <i>cube attack</i>, a chosen plaintext algebraic cryptanalysis technique for the offline acquisition of an equivalent system by means of monomial reduction; interpolation on <i>cubes</i> in the space of variables enables retrieving a linear polynomial system, hence making it exploitable in the online phase to recover the secret key. Since its introduction, this attack has received both many criticisms and endorsements from the crypto community; this work aims at providing, under a unified notation, a complete state-of-the-art review of recent developments by categorising contributions in five classes. We conclude the work with an in-depth description of the <i>kite attack framework</i>, a cipher-independent tool that implements cube attacks on GPUs. Mickey2.0 is adopted as a showcase.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"285 - 325"},"PeriodicalIF":0.6,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00602-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45636548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1007/s00200-023-00605-7
Boran Kim
There are various metrics for researching error-correcting codes. Especially, high-density data storage system gives the existence of inconsistency for the reading and writing process. The symbol-pair metric is motivated for outputs that have overlapping pairs of symbols in a certain channel. The Rosenbloom–Tsfasman (RT) metric is introduced since there exists a problem that is related to transmission over several parallel communication channels with some channels not available for the transmission. In this paper, we determine the minimum symbol-pair weight and RT weight of repeated-root cyclic codes over (mathfrak R=mathbb {F}_{p^m}[u]/langle u^4rangle ) of length (n=p^k). For the determination, we explicitly present third torsional degree for all different types of cyclic codes over (mathfrak R) of length n.
{"title":"Determination for minimum symbol-pair and RT weights via torsional degrees of repeated-root cyclic codes","authors":"Boran Kim","doi":"10.1007/s00200-023-00605-7","DOIUrl":"10.1007/s00200-023-00605-7","url":null,"abstract":"<div><p>There are various metrics for researching error-correcting codes. Especially, high-density data storage system gives the existence of inconsistency for the reading and writing process. The symbol-pair metric is motivated for outputs that have overlapping pairs of symbols in a certain channel. The Rosenbloom–Tsfasman (RT) metric is introduced since there exists a problem that is related to transmission over several parallel communication channels with some channels not available for the transmission. In this paper, we determine the minimum symbol-pair weight and RT weight of repeated-root cyclic codes over <span>(mathfrak R=mathbb {F}_{p^m}[u]/langle u^4rangle )</span> of length <span>(n=p^k)</span>. For the determination, we explicitly present third torsional degree for all different types of cyclic codes over <span>(mathfrak R)</span> of length <i>n</i>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 4","pages":"573 - 588"},"PeriodicalIF":0.6,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42822754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-22DOI: 10.1007/s00200-023-00601-x
M. Pazoki, R. Nikandish
The strongly annihilating-ideal graph (textrm{SAG}(R)) of a commutative unital ring R is a simple graph whose vertices are non-zero ideals of R with non-zero annihilator and there exists an edge between two distinct vertices if and only if each of them has a non-zero intersection with annihilator of the other one. In this paper, we compute twin-free clique number of (textrm{SAG}(R)) and as an application strong metric dimension of (textrm{SAG}(R)) is given. Moreover, we investigate the structures of strong resolving sets in (textrm{SAG}(R)) to find forcing strong metric dimension in (textrm{SAG}(R)).
{"title":"Computing the (forcing) strong metric dimension in strongly annihilating-ideal graphs","authors":"M. Pazoki, R. Nikandish","doi":"10.1007/s00200-023-00601-x","DOIUrl":"10.1007/s00200-023-00601-x","url":null,"abstract":"<div><p>The strongly annihilating-ideal graph <span>(textrm{SAG}(R))</span> of a commutative unital ring <i>R</i> is a simple graph whose vertices are non-zero ideals of <i>R</i> with non-zero annihilator and there exists an edge between two distinct vertices if and only if each of them has a non-zero intersection with annihilator of the other one. In this paper, we compute twin-free clique number of <span>(textrm{SAG}(R))</span> and as an application strong metric dimension of <span>(textrm{SAG}(R))</span> is given. Moreover, we investigate the structures of strong resolving sets in <span>(textrm{SAG}(R))</span> to find forcing strong metric dimension in <span>(textrm{SAG}(R))</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"273 - 283"},"PeriodicalIF":0.6,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00601-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42668152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-07DOI: 10.1007/s00200-023-00600-y
E. Hoxhaj, J. M. Menjanahary, J. Schicho
The task of recognizing an algebraic surface from a single apparent contour can be reduced to the recovering of a homogeneous equation in four variables from its discriminant. In this paper, we use the fact that Darboux cyclides have a singularity along the absolute conic in order to recognize them up to Euclidean similarity transformations.
{"title":"Using algebraic geometry to reconstruct a darboux cyclide from a calibrated camera picture","authors":"E. Hoxhaj, J. M. Menjanahary, J. Schicho","doi":"10.1007/s00200-023-00600-y","DOIUrl":"10.1007/s00200-023-00600-y","url":null,"abstract":"<div><p>The task of recognizing an algebraic surface from a single apparent contour can be reduced to the recovering of a homogeneous equation in four variables from its discriminant. In this paper, we use the fact that Darboux cyclides have a singularity along the absolute conic in order to recognize them up to Euclidean similarity transformations.\u0000</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"255 - 271"},"PeriodicalIF":0.6,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00600-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42691999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1007/s00200-023-00599-2
István András Seres, Máté Horváth, Péter Burcsi
Sequences of consecutive Legendre and Jacobi symbols as pseudorandom bit generators were proposed for cryptographic use in 1988. Major interest has been shown towards pseudorandom functions (PRF) recently, based on the Legendre and power residue symbols, due to their efficiency in the multi-party setting. The security of these PRFs is not known to be reducible to standard cryptographic assumptions. In this work, we show that key-recovery attacks against the Legendre PRF are equivalent to solving a specific family of multivariate quadratic (MQ) equation system over a finite prime field. This new perspective sheds some light on the complexity of key-recovery attacks against the Legendre PRF. We conduct algebraic cryptanalysis on the resulting MQ instance. We show that the currently known techniques and attacks fall short in solving these sparse quadratic equation systems. Furthermore, we build novel cryptographic applications of the Legendre PRF, e.g., verifiable random function and (verifiable) oblivious (programmable) PRFs.
{"title":"The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications","authors":"István András Seres, Máté Horváth, Péter Burcsi","doi":"10.1007/s00200-023-00599-2","DOIUrl":"10.1007/s00200-023-00599-2","url":null,"abstract":"<div><p>Sequences of consecutive Legendre and Jacobi symbols as pseudorandom bit generators were proposed for cryptographic use in 1988. Major interest has been shown towards pseudorandom functions (PRF) recently, based on the Legendre and power residue symbols, due to their efficiency in the multi-party setting. The security of these PRFs is not known to be reducible to standard cryptographic assumptions. In this work, we show that key-recovery attacks against the Legendre PRF are equivalent to solving a specific family of multivariate quadratic (MQ) equation system over a finite prime field. This new perspective sheds some light on the complexity of key-recovery attacks against the Legendre PRF. We conduct algebraic cryptanalysis on the resulting MQ instance. We show that the currently known techniques and attacks fall short in solving these sparse quadratic equation systems. Furthermore, we build novel cryptographic applications of the Legendre PRF, e.g., verifiable random function and (verifiable) oblivious (programmable) PRFs.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"223 - 253"},"PeriodicalIF":0.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00599-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82265861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-21DOI: 10.1007/s00200-023-00597-4
Marlene Koelbing, Bernhard Garn, Enrico Iurlano, Ilias S. Kotsireas, Dimitris E. Simos
In this paper, we compute sequence covering arrays (SCAs), which are arrays, consisting of sequences, such that all subsequences with pairwise different entries of some length are covered, via a novel approach based on commutative algebra and symbolic computation. Hereby, we provide various algebraic models being capable to characterize possibly small sets of permutations collectively containing particular shorter subsequences. These models take the form of multivariate polynomial systems of equations and are then processed via supercomputing by a Gröbner Basis solver in order to compute solutions from them. If the variety is not empty, i.e. the Gröbner basis is non-trivial, then each point in the computed variety can be transformed to a SCA. In our experiments, we observed varying computational performance depending on the chosen model, while all of them exhibited scalability issues. Additionally and for comparison, we give new SAT descriptions modelling SCAs. By employing a SAT solver on our provided SAT models, we are able to provide upper bounds, one of which is best among literature results. Lastly, we adapt our SAT approach to answer a question posed by Yuster (Des Codes Cryptogr 88(3):585–593, 2020). As a result, we find a characterization of the dimensions of all perfect SCAs with coverage multiplicity two of strength three.
{"title":"Algebraic and SAT models for SCA generation","authors":"Marlene Koelbing, Bernhard Garn, Enrico Iurlano, Ilias S. Kotsireas, Dimitris E. Simos","doi":"10.1007/s00200-023-00597-4","DOIUrl":"10.1007/s00200-023-00597-4","url":null,"abstract":"<div><p>In this paper, we compute sequence covering arrays (SCAs), which are arrays, consisting of sequences, such that all subsequences with pairwise different entries of some length are covered, via a novel approach based on commutative algebra and symbolic computation. Hereby, we provide various algebraic models being capable to characterize possibly small sets of permutations collectively containing particular shorter subsequences. These models take the form of multivariate polynomial systems of equations and are then processed via supercomputing by a Gröbner Basis solver in order to compute solutions from them. If the variety is not empty, i.e. the Gröbner basis is non-trivial, then each point in the computed variety can be transformed to a SCA. In our experiments, we observed varying computational performance depending on the chosen model, while all of them exhibited scalability issues. Additionally and for comparison, we give new SAT descriptions modelling SCAs. By employing a SAT solver on our provided SAT models, we are able to provide upper bounds, one of which is best among literature results. Lastly, we adapt our SAT approach to answer a question posed by Yuster (Des Codes Cryptogr 88(3):585–593, 2020). As a result, we find a characterization of the dimensions of all perfect SCAs with coverage multiplicity two of strength three.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 2","pages":"173 - 222"},"PeriodicalIF":0.6,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-023-00597-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48363389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}